Sciweavers

1763 search results - page 114 / 353
» Visualize and Open Up
Sort
View
CCS
2000
ACM
15 years 9 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
137
Voted
SODA
2004
ACM
115views Algorithms» more  SODA 2004»
15 years 6 months ago
Minimizing the stabbing number of matchings, trees, and triangulations
The (axis-parallel) stabbing number of a given set of line segments is the maximum number of segments that can be intersected by any one (axis-parallel) line. We investigate probl...
Sándor P. Fekete, Marco E. Lübbecke, H...
COR
2011
15 years 23 hour ago
MIP models for connected facility location: A theoretical and computational study
This article comprises the first theoretical and computational study on mixed integer programming (MIP) models for the connected facility location problem (ConFL). ConFL combines...
Stefan Gollowitzer, Ivana Ljubic
CSE
2011
IEEE
14 years 4 months ago
Performance Modeling of Hybrid MPI/OpenMP Scientific Applications on Large-scale Multicore Cluster Systems
In this paper, we present a performance modeling framework based on memory bandwidth contention time and a parameterized communication model to predict the performance of OpenMP, M...
Xingfu Wu, Valerie E. Taylor
113
Voted
KBSE
2005
IEEE
15 years 10 months ago
Visualization-based analysis of quality for large-scale software systems
We propose an approach for complex software analysis based on visualization. Our work is motivated by the fact that in spite of years of research and practice, software developmen...
Guillaume Langelier, Houari A. Sahraoui, Pierre Po...